Understanding DoS and DDoS Attacks
Hacked: Hacking Finance


Understanding DoS and DDoS Attacks

Posted on .

Understanding DoS and DDoS Attacks


This article was posted on Monday, 11:05, UTC.

Here’s the rundown on a growing cyberspace menace that represents a threat to online services, websites, and platforms.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

What is a denial-of-service (DoS) attack?

Denial-of-service (DoS) happens when you can no longer access digital information or services. With DoS, an attacker can prevent you from accessing websites, online accounts – including your email and bank accounts.

Attackers can deny you access by targeting the following:
-Your computer;
-Your network connection; or
-The computers and networks of the websites you are trying to access.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

Types of DoS Attacks

Network Flooding

In network flooding, attackers “flood” the network with information. Whenever you enter a URL into your web browser, a request is then sent to the computer server of the website that you are trying to access. Servers have limitations. They can only process a certain number of requests at a given time. Attackers can deny access to a website by overloading or flooding the server with requests. It cannot then process your request to view the site. This way, attackers can deny you access to a particular site – thus, the term “denial-of-service” came into being.

Email Flooding

Email flooding can happen not just with free email services like Yahoo or Hotmail, but also with the email supplied to you by your employer. Remember that your email account has a specific quota. If you exceed this quota, you can no longer receive legitimate email messages. In email flooding, attackers can deny you access to your email account by flooding your email account with too many or large messages. In this type of denial-of service, attackers will consume your email quota, thereby, blocking you from receiving genuine messages from legitimate contacts.

What is a distributed denial-of-service (DDoS) attack?

A DDoS attack is similar to DoS. The difference between the two is that in a DDoS, attackers may access your computer to attack another computer. Once attackers take control of your computer, they could send a huge amount of data to a server or to specific email addresses.

// -- Get exclusive consultation for as low as $249 per month on MoneyMakers.com -- //

It is called “distributed” because the attackers need to use a number of computers, including your own, to initiate an attack.

The hosting company OVH was recently hit by a DDoS attack.

OVH founder and CTO Octave Klaba reported via his Twitter account the said attack.

“Last days, we got lot of huge DDoS. Here, the list of “bigger that 100Gbps” only. You can see the simultaneous DDoS are close to 1Tbps!,” Klaba wrote on his Twitter account.

How to prevent DoS/DDoS attacks?

According to the United States Computer Emergency Readiness Team (US-CERT), “Unfortunately, there are no effective ways to prevent being the victim of DoS or DDoS attack….”

The US-CERT, however, gives the following tips to reduce the likelihood of DoS or DDoS attack:
1. Install and maintain anti-virus software
2. Install a firewall and configure it to limit traffic coming in and out of your computer
3. Follow good security practices for distributing your email address. Using email filters, according to US-CERT, may help you manage unwanted traffic.

What to do during a DoS or DDoS attack?

According to US-CERT, it is difficult to determine the actual source or actual target of DoS or DDoS attack.

The best solution in case of a DoS or DDoS attack is to seek professional help. Contact your network administrator if you cannot access files or external websites using your computer at work.

In case you cannot access your files or external websites using your personal computer, contact your internet service provider (ISP).

Respondents of the Arbor Networks’ 2015 “Worldwide Infrastructure Security Report” listed the following as their DDoS mitigation techniques:

• Intelligence DDoS mitigation systems (IDMS)
• Access control lists (ACLs)
• Destination-based remote triggered blackhole (D/RTBH)
• Firewall
• Source-based remote triggered blackhole (S/RTBH)
• Load-balancer
• FlowSpec
• Managed security service provider
• Content delivery network (CDN)

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.

Feedback or Requests?

Ellen Red

Ellen Red

There are no comments.

View Comments (0) ...
The team:
Dmitriy Lavrov
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com. // -- Discuss and ask Read More
P.H. Madore
ICO Analyst
P. H. Madore lives in Arkansas with his wife and children. He has covered the cryptocurrency beat over the course of hundreds of articles for Hacked’s sister site, CryptoCoinsNews, as Read More
Mate Csar
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Justin O’Connell
Justin O’Connell is a cryptocurrency journalist who works have appeared in the U.S.’s third largest weekly, the San Diego Reader & VICE. // -- Discuss and ask questions in our community Read More
Mati Greenspan
Senior Market Analyst at Etoro.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Important: Never invest Read More
Rakesh Upadhyay
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Read More
Joseph Young
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More
Netflix goes down and the world erupts in collective despair.…